Dahua Technology DH-IVS-IP8000-E-GU1 User Manual
Dahua Technology DH-IVS-IP8000-E-GU1 User Manual

Dahua Technology DH-IVS-IP8000-E-GU1 User Manual

Intelligent server for public event detection

Advertisement

Quick Links

Intelligent Server for Public Event
Detection
User's Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD
V1.0.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the DH-IVS-IP8000-E-GU1 and is the answer not in the manual?

Questions and answers

Summary of Contents for Dahua Technology DH-IVS-IP8000-E-GU1

  • Page 1 Intelligent Server for Public Event Detection User's Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD V1.0.0...
  • Page 2: Foreword

    This manual introduces the functions and operations of the Event Detection Intelligent Server (hereinafter referred to as "the Server"). Models Device Model DH-IVS-IP8000-E-GU1 DH-IVS-IP8000-2E-GU2, DH-IVS-IP8000-3E-GU2, DH-IVS-IP8000-4E-GU2, DH-IVS- IP8000-5E-GU2, and DH-IVS-IP8000-6E-GU2 Safety Instructions The following signal words might appear in the manual.
  • Page 3: About The Manual

    User's Manual on these interfaces. About the Manual ● The manual is for reference only. Slight differences might be found between the manual and the product. ● We are not liable for losses incurred due to operating the product in ways that are not in compliance with the manual.
  • Page 4: Important Safeguards And Warnings

    User's Manual Important Safeguards and Warnings This section introduces content covering the proper handling of the device, hazard prevention, and prevention of property damage. Read carefully before using the device, comply with the guidelines when using it, and keep the manual safe for future reference. Transportation Requirements Transport the server under allowed humidity and temperature conditions.
  • Page 5: Operation Requirements

    User's Manual Operation Requirements ● This is a class A product. In a domestic environment this may cause radio interference in which case you may be required to take adequate measures. ● The device is heavy and needs to be carried by several persons together to avoid personal injuries.
  • Page 6: Table Of Contents

    User's Manual Table of Contents Foreword ........................................I Important Safeguards and Warnings ............................III 1 Overview ........................................1 1.1 Introduction ....................................1 1.2 Functions ....................................... 1 1.3 Structure ......................................5 1.3.1 1U ......................................5 1.3.2 2U ......................................7 1.4 Networking Diagram ................................9 2 Cable Connection ....................................
  • Page 7 User's Manual 4.4.2.16 Running Detection ............................58 4.4.2.17 Smoking Detection ............................60 4.4.2.18 Sleeping with Quilt Covering Head Detection ................. 63 4.4.2.19 Posture Detection ............................65 4.4.3 Video Quality Diagnosis ............................67 4.4.4 (Optional) Target Filter .............................. 68 4.5 Real-time Monitoring ................................70 4.6 Searching for Alarm Information .............................
  • Page 8: Overview

    User's Manual 1 Overview 1.1 Introduction The intelligent event detection server is a device that automatically analyzes video surveillance images and extracts key information from the video source to identify and distinguish objects. It makes judgments based on custom event types and triggers alarms once abnormal behaviors or unexpected events are detected, turning video surveillance from track back after the event to early warning before the event.
  • Page 9 User's Manual Functions Description ● Store alarm information, including monitoring point, time, detection channel, alarm event type, and alarm event snapshot. Alarm Information ● Search for alarm information by multiple video channels or periods Search (closed intervals). ● Generate a report on all or a selection of the search results. Table 1-2 Description of intelligent analysis Functions Description...
  • Page 10 User's Manual Functions Description ● Set the detection area as a polygon with an arbitrary shape. ● Set the minimum duration and report interval. Minimum duration: 1 Stay Detection s–60 s; report interval: 1 s–600 s. ● An alarm is triggered when the stay (loitering) duration exceeds the defined time for the specified area.
  • Page 11 User's Manual Functions Description ● Set the detection area as a polygon with an arbitrary shape. ● An alarm is triggered when suspicious objects are left in key Object Detection detection areas or are moved for longer than the minimum duration time.
  • Page 12: Structure

    Table 1-3 Description of analysis capacities (1) Server Model Description ● 32-channel 1080p real-time video stream analysis. DH-IVS-IP8000-E-GU1 ● Each channel of video can be configured with up to10 identical or different AI rules. Table 1-4 Description of analysis capacities (2) Server...
  • Page 13 User's Manual Port, panel, or slot Description ● Press to turn on the server and the indicator will switch on. You can quickly locate the server through UID switch and indicator the indicator. ● When the server is enabled, press to disable it. Press and hold it, and the server restores to its factory Reset button settings.
  • Page 14 User's Manual 1.3.2 2U Front Panel Figure 1-3 Front Panel Table 1-7 Front panel description Port/Indicator Description Power switch. When the server is on, press and hold this button Power button for longer than 4 seconds to turn it off. UID button can be used as an indicator for easy positioning of the server.
  • Page 15 User's Manual Port/Indicator Description It indicates the HDD read-write status. ● When a RAID card is not installed: ◇ Green indicator flashing: HDD is in the read-write status. ◇ HDD read-write Indicator is off: HDD is not in place or failed. indicator ●...
  • Page 16: Networking Diagram

    User's Manual Panel/Port/In Description dicator VGA video output port outputs analog video signals and can be VGA port connected to a monitor to view the local interface of the server. Serial port Connected to the display device for debugging. USB3.0 port Connects to a mouse, keyboard, USB storage device, and more.
  • Page 17 User's Manual Figure 1-5 Typical Networking...
  • Page 18: Cable Connection

    User's Manual 2 Cable Connection Prerequisites Check the Server and cables to make sure there is no obvious damage before connecting the device. Also, ensure that all cables are connected properly before powering on the Server. Procedure Step 1 Connect the Server with the VGA display. Step 2 Connect the network cable to the Server.
  • Page 19: Installing Client

    User's Manual 3 Installing Client Prerequisites ● Windows 7 or Windows 10 is used for software installation. ● The PC resolution must be least 1280 × 800. ● We recommend you disable the computer firewall for normal installation and use of the software. Procedure Step 1 Double-click Intelligent Video Analysis Client Software.exe.
  • Page 20 User's Manual Figure 3-2 Installation completed...
  • Page 21: Client Operation

    User's Manual 4 Client Operation 4.1 Logging in to Client Double-click on the desktop to open the Behavior Analysis Client. Figure 4-1 Client homepage 4.2 System Configuration View the version, built date, and the open source statement of the client. Select whether to enable Filter Uniform Alarm, which indicates whether uniform alarms are displayed in the real-time alarm column when alarm events occur.
  • Page 22: Device Management

    User's Manual Figure 4-2 System configuration Step 2 (Optional) Select Filter Uniform Alarm. If Filter Uniform Alarm is selected, no alarm is displayed in the real-time alarm column when uniformed personnel are detected. If Filter Uniform Alarm is not selected, alarms are displayed in the real-time alarm column when uniformed personnel are detected.
  • Page 23 User's Manual Figure 4-3 Manage device Step 2 Click Add to configure the parameters. Figure 4-4 Add device Table 4-1 Description of adding device parameters Parameter Description Device Type The type of device to be added. Device Name Enter a name for the server to differentiate it from other servers. Device IP The IP address of device.
  • Page 24 User's Manual Parameter Description Username Username for logging in to the device. Password Password for logging in to the device. Click OK. Step 3 After the device is added, the client logs in to the device automatically. The login status is Online and the device type is Video Analysis Server, which means successful login.
  • Page 25: Managing Remote Devices

    User's Manual 4.3.2 Managing Remote Devices Manage remote devices and channels. If rules are configured after enabling the smart plan, an alarm will be generated once an event that meets the rules occurs. Procedure Step 1 Add remote devices. 1. Click on the Device Manager page.
  • Page 26 User's Manual Table 4-2 Parameter description Parameter Description Device Name The name that differentiates a device. Device IP The device IP address. Device Port Port number Username Username and password for logging in to the remote device. Password Manufacturer Select device manufacturer. Select the device type depending on the actual remote device.
  • Page 27 User's Manual Figure 4-9 Channel Information Step 3 (Optional) Enable intelligent analysis. For channels added for the first time, Enable is selected by default. If the intelligent analysis is not enabled for the channel, the original video can be played but rule configuration and intelligent analysis are not available.
  • Page 28: Intelligent Video Analysis

    User's Manual 4.4 Intelligent Video Analysis Enable the smart plan and configure rules. You can configure up to 10 AI rules and video quality diagnosis. 4.4.1 Enabling Smart Plan Procedure Step 1 Click Real Monitor on the home page of the client. Right-click a channel to select IVS Config.
  • Page 29: Ivs Rules

    User's Manual Related Operations ● Click Import to import the XML file of configured IVS rules. ● Click Export to export the XML file of configured IVS rules. 4.4.2 IVS Rules On the IVS Config page, you can add multiple alarm rules for each channel. You can set rules for the following detection scenarios: Tripwire, intrusion, climbing, getting up, staying (loitering), sleep, people number exception, loudness, fighting, staying alone, crowd gathering, object, call, using mobile phone, fall, running, smoking, sleeping with quilt covering head, head on wall, and video...
  • Page 30 User's Manual Figure 4-11 Tripwire Step 7 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. Figure 4-12 Tripwire parameter configuration Table 4-3 configure the parameters Item Description Select the trigger position, including center, left center, top center, right Alarm Position center and bottom center.
  • Page 31: Intrusion Detection

    User's Manual ● Full-time arming is enabled by default. You can adjust the arming time. ● You can set up to six periods for each day. ● After configuring the arming schedule for one day, you can select other days (one or more) in the Copy section, and then click Copy to copy the configured arming schedule for other days.
  • Page 32 User's Manual Figure 4-14 Intrusion Step 7 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters.
  • Page 33 User's Manual Figure 4-15 Parameters Table 4-4 Parameter description Parameter Description Select Is Inside for scenarios when the target stays in the area. You need to set minimum target number, maximum target Is Inside number, minimum duration, and report interval. No need to set direction.
  • Page 34 User's Manual Parameter Description When an alarm even occurs, and the target remains in the detection area for longer than the defined interval, another Report Interval alarm will be triggered and information on the event will be shown on the screen. (Optional) Feature Enable Identifies police uniforms and yellow vests.
  • Page 35: Climbing Detection

    User's Manual 4.4.2.3 Climbing Detection An alarm is triggered when a target climbs up and crosses the drawn climbing line. Step 1 Click Real Monitor on the home page of the client. Step 2 right-click a channel, and then select IVS Config. Step 3 Select the smart plan, and then click Next to go to the IVS page.
  • Page 36: Getting Up Detection

    User's Manual ● After configuring the arming schedule for one day, you can select other days (one or more) in the Copy section, and then click Copy to copy the configured arming schedule for other days. Figure 4-19 Arming schedule 3.
  • Page 37 User's Manual according to the prompts. ● You can only draw four points in the bed area. ● The arrow direction of the sleep line is from the head to feet of the target. ● Draw the detection line on the chest of the person. Figure 4-20 Getting up detection Step 6 Click Config to configure the parameters and the arming schedule.
  • Page 38: Staying (Loitering) Detection

    User's Manual Figure 4-22 Arming schedule 3. Click Save. Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.5 Staying (Loitering) Detection An alarm is triggered when the target stays in the detection area for longer than the defined time.
  • Page 39 User's Manual Figure 4-23 Stay Detection Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. ● Min Duration: An alarm is triggered when a person stays in the detection area for longer than the defined minimum duration.
  • Page 40: Sleep Detection

    User's Manual schedule for other days. Figure 4-25 Arming schedule 3. Click Save. Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.6 Sleep Detection An alarm is triggered when a person is detected as staying still or laying down on a table for a long time.
  • Page 41 User's Manual Figure 4-26 Sleep detection Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. Figure 4-27 Parameters...
  • Page 42 User's Manual Table 4-5 Parameters for sleep detection Parameter Description ● No Moving: If someone does not move or perform an action in the detection area within the defined period, an alarm will be triggered, and the alarm target will move to the position of the person. ●...
  • Page 43: Abnormal Number Of People Detection

    User's Manual Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.7 Abnormal Number of People Detection Based on the configured rules, an alarm is triggered when the number of people in the detection area does not conform to the configured rules.
  • Page 44 User's Manual Figure 4-30 Parameter configuration Table 4-6 Parameter configuration Parameter Description An alarm is triggered when the number of people in the detection area Minimum Duration does not conform to the defined value and lasts longer than the minimum duration.
  • Page 45 User's Manual Parameter Description ● Alarm when equal to threshold: An alarm is triggered when the number of people in the detection area equals to the configured threshold. ● Alarm when not equal to threshold: An alarm is triggered when the number of people in the detection area does not equal to the configured threshold (it is either higher or lower than the threshold).
  • Page 46: Abnormal Sound Detection

    User's Manual ● Full-time arming is enabled by default. You can adjust the arming time. ● You can set up to six periods for each day. ● After configuring the arming schedule for one day, you can select other days (one or more) in the Copy section, and then click Copy to copy the configured arming schedule for other days.
  • Page 47 User's Manual Only one abnormal sound detection rule can be configured for each channel. Figure 4-32 Abnormal Sound Detection Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. Figure 4-33 Parameters Table 4-7 Parameter description Item Description...
  • Page 48 User's Manual ● Full-time arming is enabled by default. You can adjust the arming time. ● You can set up to six periods for each day. ● After configuring the arming schedule for one day, you can select other days (one or more) in the Copy section, and then click Copy to copy the configured arming schedule for other days.
  • Page 49: Fight Detection

    User's Manual 4.4.2.9 Fight Detection An alarm is triggered when people are detected to be fighting. ● Fight detection is performance intensive, so make sure to correctly outline the detection area. This will increase its efficiency. ● Fight detection can be used with other rules. ●...
  • Page 50 User's Manual sensitivity. The higher the sensitivity, the easier it is for the alarms to be triggered. The false alarm rate will also increase. The sensitivity range is 1 to 10. It is 7 by default. Figure 4-36 Fight detection 2.
  • Page 51: Staying Alone Detection

    User's Manual Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.10 Staying Alone Detection An alarm is triggered when a person is alone in the detection area for longer than the defined time. Step 1 Click Real Monitor on the home page of the client.
  • Page 52 User's Manual Figure 4-39 Parameters Table 4-8 Parameters Item Description An alarm will be triggered if a person is staying alone in a detection area Min Duration for longer than the defined value. When an alarm even occurs, and the target remains in the detection area Report Interval for longer than the defined interval, another alarm will be triggered and information on the event will be shown on the screen.
  • Page 53: Crowd Gathering Detection

    User's Manual 3. Click Save. Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.11 Crowd Gathering Detection An alarm is triggered when four or more people gather and stay for longer than the defined time in the detection area.
  • Page 54 User's Manual Figure 4-41 Crowd gathering detection Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. Figure 4-42 Parameters Table 4-9 Parameters Item Description An alarm is triggered when a person stays in the detection area for longer Min Duration than the defined value.
  • Page 55: Object Detection

    User's Manual Item Description Enter sensitivity. The higher the sensitivity, the easier the alarm is to be triggered. Sensitivity The sensitivity range is from 1 to 10. It is 5 by default. 2. Click Arming schedule to change the arming schedule. ●...
  • Page 56 User's Manual defined period. Step 1 Click Real Monitor on the home page of the client. Step 2 right-click a channel, and then select IVS Config. Step 3 Select the smart plan, and then click Next to go to the IVS page. Step 4 Click Add rule.
  • Page 57 User's Manual Figure 4-45 Parameters Table 4-10 Parameters Parameter Description ● Left: an alarm is triggered when an object is left in the detection area for longer than the defined time. Action List ● TakenAway: an object detection alarm is triggered when an object is moved from the detection area and is not moved back within the defined time.
  • Page 58: Call Detection

    User's Manual Figure 4-46 Arming schedule 3. Click Save. Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.13 Call Detection An alarm is triggered when a person makes a phone call in the detection area, and remains on the phone for longer than the defined period.
  • Page 59 User's Manual Figure 4-47 Call detection Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. Figure 4-48 Parameters Table 4-11 Parameters Parameter Description An alarm is triggered when a person makes a phone call in the detection Min Duration area and remains on the phone for longer than the defined time.
  • Page 60: Using Mobile Phone Detection

    User's Manual Parameter Description Set the sensitivity as needed. The higher the sensitivity, the easier it is for the alarm to be triggered. Sensitivity The sensitivity range is 1 to 10, with 5 by default. 2. Click Arming schedule to change the arming schedule. ●...
  • Page 61 User's Manual defined time. Step 1 Click Real Monitor on the home page of the client. Step 2 right-click a channel, and then select IVS Config. Step 3 Select the smart plan, and then click Next to go to the IVS page. Step 4 Click Add rule.
  • Page 62 User's Manual Table 4-12 Parameters Parameter Description An alarm is triggered when a person uses their phone in the detection area Min Duration for longer than the defined time. When an alarm even occurs, and the target remains in the detection area for Report Interval longer than the defined interval, another alarm will be triggered and information on the event will be shown on the screen.
  • Page 63: Fall Detection

    User's Manual ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.15 Fall Detection An alarm is triggered when a person falls down or squats in the detection area for longer than the defined time. Step 1 Click Real Monitor on the home page of the client.
  • Page 64 User's Manual Figure 4-54 Parameters Table 4-13 Parameters Parameter Description An alarm is triggered when a person falls down or squats in the detection Min Duration area for longer than the defined time. When an alarm even occurs, and the target remains in the detection area Report Interval for longer than the defined interval, another alarm will be triggered and information on the event will be shown on the screen.
  • Page 65: Running Detection

    User's Manual Figure 4-55 Arming schedule 3. Click Save. Step 8 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.16 Running Detection An alarm is triggered when a person runs fast in the detection area.
  • Page 66 User's Manual Figure 4-56 Fast run Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to set the sensitivity as needed. The higher the sensitivity, the easier it is for an alarm to be triggered. The sensitivity range is from 1 to 10.
  • Page 67: Smoking Detection

    User's Manual Figure 4-58 Arming schedule 3. Click Save. Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.17 Smoking Detection An alarm is triggered when a person smokes in the detection area for longer than the defined time.
  • Page 68 User's Manual Figure 4-59 Smoking detection Step 6 Click Config to configure the parameters and arming schedule. 1. Click Parameters to configure the parameters. Figure 4-60 Parameters Table 4-14 Parameters Parameter Description An alarm is triggered when a person smokes in the detection area for Min Duration longer than the minimum duration.
  • Page 69 User's Manual Parameter Description Set the sensitivity as needed. The higher the sensitivity, the easier it is for the alarm to be triggered. Sensitivity The sensitivity range is from 1 to 10. It is 5 by default. 2. Click Arming schedule to change the arming schedule. ●...
  • Page 70: Sleeping With Quilt Covering Head Detection

    User's Manual 4.4.2.18 Sleeping with Quilt Covering Head Detection An alarm is triggered when a person sleeps with their head covered for longer than the defined time. Step 1 Click Real Monitor on the home page of the client. Step 2 right-click a channel, and then select IVS Config.
  • Page 71 User's Manual Figure 4-63 Parameters Table 4-15 Parameters Parameter Description An alarm is triggered when a person sleeps with their head covered for Min Duration longer than the minimum duration. When an alarm even occurs, and the target remains in the detection area for Report Interval longer than the defined interval, another alarm will be triggered and information on the event will be shown on the screen.
  • Page 72: Posture Detection

    User's Manual Figure 4-64 Arming schedule 3. Click Save. Step 7 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.4.2.19 Posture Detection An alarm is triggered when a person hits the wall repeatedly for longer than the defined time.
  • Page 73 User's Manual Figure 4-65 Posture detection Step 6 Click Config to configure the parameters and the arming schedule. 1. Click Parameters to configure the parameters. Figure 4-66 Parameters Table 4-16 Parameters Parameter Description Select HitWall. Detection Mode Standing up and running into a wall is included in fast run detection. An alarm is triggered when a person hits the wall repeatedly for longer Min Duration than the minimum duration.
  • Page 74: Video Quality Diagnosis

    User's Manual Parameter Description When an alarm even occurs, and the target remains in the detection area Report Interval for longer than the defined interval, another alarm will be triggered and information on the event will be shown on the screen. 2.
  • Page 75: Optional) Target Filter

    User's Manual exceeded in the video. Prerequisites Server has been added. For details, see "4.3.1 Adding Devices". Procedure Step 1 On the home page of the client, click Device Manager > Select Enable to enable video quality diagnosis. Step 2 Step 3 Configure the parameters.
  • Page 76 User's Manual filter out targets that are too small or too large. Target filter is available for tripwire, intrusion, climbing detection, getting up detection, sleep detection, and staying alone detection. Step 1 Click Real Monitor on the home page. Step 2 right-click a channel, and then select IVS Config.
  • Page 77: Real-Time Monitoring

    User's Manual Figure 4-70 Draw filter boxes Step 6 Save IVS. ● Click Save to save the IVS configuration and exit the page. ● Click Apply to save the IVS configuration without exiting the page. 4.5 Real-time Monitoring Log in to the server remotely at the client to view the real-time monitoring image. Step 1 Click Real Monitor on the home page.
  • Page 78 User's Manual Monitoring. indicates that the channel is in live view. indicates that the live view of the channel is not enabled. Intelligent event alarm information is displayed on the right side. Double-click the alarm information to view details. Figure 4-71 Alarm details Right-click a channel and then select IVS Config to enter the IVS page.
  • Page 79: Searching For Alarm Information

    User's Manual 4.6 Searching for Alarm Information Search for the alarm event information of channels that are on the event detection server within the defined time. Procedure Step 1 Select Event Query > Step 2 Select a server and channels under it. Step 3 Select Event Type.
  • Page 80 User's Manual Figure 4-74 Intelligent event details Related Operations ● Select the alarm records as needed, and then click Export Selected to export them to your computer in CSV, Excel or TXT format. Figure 4-75 Alarm ● Click Total Count at the lower-right corner, and then click Export All to export all alarm records to your computer in CSV, Excel or TXT format.
  • Page 81: Appendix 1 Cybersecurity Recommendations

    User's Manual Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
  • Page 82 User's Manual 1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the equipment, thus reducing the risk of ARP spoofing.
  • Page 83 User's Manual ● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device. More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations.
  • Page 84 User's Manual...

Table of Contents